Time
5 hours 49 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:01
Hello, everybody. And welcome to the security episode number 11.
00:06
I don't t common device Architectural. My name is Alejandro Pena, and I'll be your instructor for today's session.
00:14
The learning objectives were this module is to understand and be able to identify the main components
00:19
off a standard I am T architecture.
00:24
Well, uh,
00:26
this is the basic architecture where we have, you know, our devices, which within sensors and, you know, smart things as we can call it, which could be cameras be. You know, you're smart. Watch your locked up your tablet. Whatever. Um,
00:46
a small thing,
00:47
uh, it will contain the sensor, and the sensor will communicate to the outside, meaning that it will be word wired or wireless.
00:57
We can use w pen, remember, wireless personal area network or double Len,
01:03
which is, you know, the same. Just worthless. And we'll have internet, which you know, is a word.
01:10
Uh, then we have or get ways which remember that these are some kind of translators, because at the end of these right here, uh,
01:22
they ah, operate, you know, in
01:26
have you met, But is there where they use the A B s particles,
01:36
which you know, based on for application, presentation and session. Uh, like,
01:42
let's see them Q T t
01:46
the s Ah,
01:49
you know, uh uh, you know, Z the
01:55
all these are, you know, like, human, readable, if you can, you know, you would like to call it by that particle. So they have to go to down into the Aussie marvel the stack, and they have to be
02:08
irritable, like other machines. In this case, they will be. They will have to travel the internet, so they have to go to to get away, which, you know, it's some kind of translator. And then they go to the cloud to the Internet to, you know, whatever that will make the money because, you know, at the end, you will
02:28
for chase something you will
02:30
on. I'll buy something. You will get something. You will, uh, give some information away. Wherever you're doing. Something is making money
02:38
in the process.
02:40
And then at the end, you know, since you travel the cloud or the internet, then the communication can commit. Hold central in that you can communicate with other devices. Devices, For example, your French, your stove, your outsmart. Often you're just my relax. Whatever. This is more in your home.
03:00
It will communicate hard, centrally, meaning that again you can control
03:04
from one device to another May Maybe you can tune under to be from yours, my watch or your phone, or you can, you know, turn the lights on enough
03:14
again from Jos Mara. Watch. Just This is just an example. And the communication can be Burt because, well, I mean that you can communicate from the smart watch or just smart device to the server. Maybe the sugar is collecting some information. Merger health. Or is, um,
03:32
you're downloading the latest Our firm were to upgrade your dirt and off your device.
03:40
So this is the basic, uh, coyote infrastructure. But let's dive into, you know, a deeper level on the sensor or this month thing, which is right here. What's inside of these devices?
03:57
Well, the attic device is divided in this section stream in sections. First, we have the sensor,
04:06
the sensor interface and the P m. You, which is, you know, stands for forward management unit.
04:15
So these two you know, this is where you interact with your small device. Maybe here can smartwatch or your phone or whatever that you're interacting to. And, of course, the energy. Our power management unit. Now at the end, the sensor just, you know, munchers collects the data at the end of the day.
04:33
Um, the power management units richest individual devices, components, You know, enough,
04:40
You know, be the power cord if you like. Then we have the host processor, which is not some kind of brain of the device. This is where all that, you know, things happen. Whether you want to go. Do you want to Just like the time when you want to know
04:56
your heart bit? You want to know? How much did you run last night? You want to know
05:00
everything on your device? This is where the magic happens, the house processor. And then we have three main components, which is the memory, you know, working memory and storage memory. You know, flash
05:15
served the data and the locations that needed to So your device can run successfully All that as you want him to run
05:25
on the Cuba explain. Well, pretty basic being two phrases you can deal with
05:30
and the connectivity at the end. This is where all the previous protocols we saw happened, you know, with their wife. Five wireless, Bluetooth Internet wire,
05:43
Uh, miracles. This what the activity happens, and then you go to the Internet, um,
05:48
or do other divisive. Remember, the communication can be hard, subtle meaning from one device to another, or vertical meaning from one device to server or one device to their get away or to the cloud itself.
06:05
What does P M knew? It stands for in the India T context? Well, is powered management unit basically the part of the device that searches on enough the device?
06:19
Mention a list. Three basic components inside everybody's Well, we convention, all of them. The sensors, which you know monitors and collects the data. The Power Management Unit, the host processor, which is the brain of the advice, the memory, you know, both in use and at rest.
06:40
They hold the attention's needed to show you shouldn't device can run
06:44
uh, the keeper of the displayed justice, the man machine interface
06:48
and the conductivity wife. I wanted less blew through Whatever connectivity duty you're using, this is where they can activity happens
06:58
and what those w pants stands for.
07:01
Well, this is well this personal area network.
07:08
In today's reflection, er we discussed the main eye ot architecture components, both the architecture itself, off off, America off communication from one device to the server and architectural off the device itself. What's inside of the i o. T. Goodbyes?
07:27
I highly recommend it to go to this link. It explains so much more you will see some additional information off. For example, what kind of sensors can you use for different I T purposes? What's the harm off each of the sensors? I mean,
07:45
what kind of knowledge do you have? You need to have
07:46
Internet to use a sensor of successfully. For example. It's not the same to control sensor that will get the data out of yours. My watch that a sensor that control controls the temperature in some industrial factory. They both have different
08:07
safety concerns. So yeah, this ling will explain so much more in detail.
08:13
Looking forward in the next video, we'll cover that the functional areas which are four point
08:20
So uh, thank you for watching, hoping to it, and all season

Up Next

IoT Security

This IoT Security training is designed to help IT professionals strengthen their knowledge about the Internet of Things (IoT) and the security platforms related to it. You’ll also be able to identify the security, privacy and safety concerns related to the implementation of an IoT infrastructure.

Instructed By

Instructor Profile Image
Alejandro Guinea
CERT Regional Director
Instructor